Sciweavers

3135 search results - page 326 / 627
» Localization Algorithms: Performance Evaluation and Reliabil...
Sort
View
WSC
2004
15 years 6 months ago
Steady-State Simulation Analysis Using Asap3
We discuss ASAP3, a refinement of the batch means algorithms ASAP and ASAP2. ASAP3 is a sequential procedure designed to produce a confidence-interval estimator for the expected r...
Natalie M. Steiger, Emily K. Lada, James R. Wilson...
124
Voted
CSSE
2006
IEEE
15 years 4 months ago
Experimental analysis of a privacy-preserving scalar product protocol
The recent investigation of privacy-preserving data mining has been motivated by the growing concern about the privacy of individuals when their data is stored, aggregated, and mi...
Zhiqiang Yang, Rebecca N. Wright, Hiranmayee Subra...
130
Voted
MOBIHOC
2008
ACM
16 years 4 months ago
Self-monitoring for sensor networks
Local monitoring is an effective mechanism for the security of wireless sensor networks (WSNs). Existing schemes assume the existence of sufficient number of active nodes to carry...
Dezun Dong, Yunhao Liu, Xiangke Liao
AUSAI
2007
Springer
15 years 8 months ago
Weight Redistribution for Unweighted MAX-SAT
Many real-world problems are over-constrained and require search techniques adapted to optimising cost functions rather than searching for consistency. This makes the MAX-SAT probl...
Abdelraouf Ishtaiwi, John Thornton, Abdul Sattar
ICS
2005
Tsinghua U.
15 years 10 months ago
Lightweight reference affinity analysis
Previous studies have shown that array regrouping and structure splitting significantly improve data locality. The most effective technique relies on profiling every access to eve...
Xipeng Shen, Yaoqing Gao, Chen Ding, Roch Archamba...